Multiple Choice
Which of the following is not a strategy for mitigating the risk of threats against information?
A) Continue operating with no controls and absorb any damages that occur
B) Transfer the risk by purchasing insurance.
C) Implement controls that minimize the impact of the threat
D) Install controls that block the risk.
E) All of the above are strategies for mitigating risk.
Correct Answer:

Verified
Correct Answer:
Verified
Q57: Cyberterrorism is usually carried out by nations.
Q58: A VPN is a network within the
Q59: The term _ refers to clandestine software
Q60: Which of the following statements concerning the
Q61: Employees in which functional areas of the
Q63: Software can be copyrighted.
Q64: Which of the following statements is false?<br>A)
Q65: _ are segments of computer code that
Q66: Access controls involve _ before _.<br>A) biometrics,
Q67: Which of the following factors is not